Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,

Similar presentations


Presentation on theme: "Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,"— Presentation transcript:

1 Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Information Security and Critical Infrastructure Protection Research Group Dept. of Informatics, Athens University of Economics and Business, Greece Safeguards in a World of Ambient Intelligence (SWAMI) Conference European Commission, JRC/IPTS, Brussels, March 2006

2 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 2 Leading Economies Structure of the presentation Agonies and trends Envisioning the emerging ICT paradigm Cornerstones and strategic planning Security and privacy strategies Plans, conflicts, social disruption and …gudgetry

3 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 3 Agonies and trends EU should adopt a holistic view of AmI, considering not just the tech- nology, but the whole of of the innovation supply-chain from scien- ce to end-user, and also the various features of the academic, industrial and administrative environment that facilitate or hinder realisation of the AmI vision (EU). AmI does not associate with a spe- cific technology, but focuses on the use of technology (EU). Source: ISTAG (2004)

4 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 4 Agonies and trends Industry turned to focus at develop- ing strategic superiority in terms of being different, rather than being fast (J). Make the countrys own paradigm different that that of any other coun- try (J). The focus is on ensuring Japans industrial lead through the establish- ment of the worlds first, only, and best ICT environment (J). Source: ITU (2006)

5 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 5 Agonies and trends Progress in shifting towards modern network technologies may establish Japan as the le- ading broadband nation, but it will not necessarily make it the leading ICT nation (J). The ubiquitous network is an ICT paradigm that was redis- covered in Japan and not im- ported by the US (J). Source: ITU (2006)

6 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 6 Agonies and trends Source: PITAC (2005) US should have a technological boost ana- logous to the the boost given by the first sa- tellite being into orbit by Soviets (US). US have not yet awakened to the central role played by computational science and high-end computing in advanced scientific, social science, biomedical, and engineering research, defense and national security, and industry innovation (US). The challenge for US of preserving their technological competitiveness is far more diffuse, complex and long-term than in was 15-20 years ago (US).

7 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 7 Envisioning the emerging ICT paradigm (1/4) The highest ideal of the dramatic machine is to make a computer so exciting, so wonderful, so interesting, that we never want to be without it. The highest ideal of the invisible machine is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it. Wieser called this notion ubiquitous computing and placed its origins in post-modernism. Source: NRI (2000)

8 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 8 Envisioning the emerging ICT paradigm (2/4) AmI imlies a seamless environment of com- puting, advanced networking technology and specific interfaces, which is aware of the spe- cific characteristics of humans presence and personalities, takes care of needs, is capable of responding intelligently to spoken or gestu- red indications of desire, and can even engage in intelligent dialogue [EU/ISTAG, 2001]. Pervasive Computing denotes the trend to- wards numerous, casually accessible often in- visible, computing devices, frequently mobile or embedded in the environment, connected to an increasingly ubiquitous network infrastructure composed of a wired core and wireless edges [USA/NIST, 2001]. Source: ITU (2006) Ubiquitous Computing ensures connectivity at any time and any place, with anyone or any object [ITU, 2006].

9 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 9 Envisioning the emerging ICT paradigm (3/4) Source: NRI (2004) Network Paradigm

10 10 Envisioning the emerging ICT paradigm (4/4) Source: NRI (2004) UbiComp Paradigm

11 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 11 Cornerstones and strategic planning: EU Opportunities: Improve civil security; New leisure, learning and work opportunities; Facilitate community building and social groupings; New forms of healthcare and social support; Tackle environmental threats; Support democratic process and delivery of public services. Requirements: Seamless mobile and fixed communications infrastructure; Dynamic and massively distributed device networks; Very unobtrusive hardware; Natural feeling human interfaces; Dependability and security. Source: ISTAG (2002)

12 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 12 Cornerstones and strategic planning: USA National priorities are: (a) Leader- ship in Science and Technology, (b) National/Homeland Security, (c) Health and Environment, (d) Economic Prosperity, (e) Well- Educated Populace, and (f) Vib-rant Civil Society. UbiCom R&D challenges include: Predictability and manageability, adaptive self-configuration, moni- toring and system health, computa- tional models, network geometry, interoperability, enabling technolo- gies, integration of technical, soci- al, ethical, and public policy issues. Source: NITRD (2004)

13 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 13 Cornerstones and strategic planning: Japan National ICT Policy (e-Japan II) is bas- ed on five strategies: (a) Development of the worlds most advanced ICT infra- structure, (b) construction of an Asian- wide platform for electronic bulletin board systems and content distribution, (c) concentrated investment on security and privacy protection, (d) establish- ment of business platdorm that connects ICT and services as new players, (e) realization of specific types of solutions (every-day life, business, government, social systems). Source: NRI (2005)

14 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 14 eu Cornerstones and strategic planning: e u Source: NRI (2005)

15 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 15 Security and privacy strategies (1/5) Source: ISTAG (2004) 7 th FP: Security is a major pylon for the Cooperation priority. The main objective of this pylon is: (a) to develop the technologies and knowledge for building ca- pabilities needed to ensure the security of citizens, while respe- cting fundamental human rights, (b) to ensure optimal and conce- rted use of available technologi- es to the benefit of European se- curity, and (c) to stimulate the cooperation of providers and us- ers for security solutions.

16 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 16 Coordinated approach to Homeland Security Security and privacy strategies (2/5) US ICT infrastructure is highly vulner- able to deliberate attacks with potential disastrous effects. The goal is cyberse- curity. Its most important facets inclu- de: (a) Domestic and international law enforcement, (b) Education, (c) Infor- mation security, (d) Sociological issu- es. Basic security and privacy prin- ciples should focus on: (a) privacy and civil liberties, (b) regulation and mar- ket forces, (c) accountability and res- ponsibility, (d) ensure flexibility, and (e) multi-year planning. Source: DHS (2006)

17 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 17 Security and privacy strategies (3/5) Source: NRI (2005)

18 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 18 Security and privacy strategies (4/5) Source: NRI (2005)

19 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 19 Security and privacy strategies (5/5) Source: NRI (2005)

20 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 20 Plans, conflicts, social disruption and …gudgetry European Union …is optimistic of AmI, but does not disregard that people will participate in a multiplicity of parallel, overlapping, inter-leaved and evolving one-to-one, one-to-many and many-to-many relationships, some short-lived, and some established temporarily and instantaneously. …is oriented towards addressing different security aspects, such as security related to the in- dividual, to communities and social groups, to the industry or to critical infrastructures. …builds citizens confidence in AmI spaces, by facing privacy issues, unfair or illegal com- mercial practices, unsolicited communications, and harmful content distribution. …has adopted AmI as its emerging ICT paradigm and aims to exploit its considered leading position in wireless and mobile technology. …wishes to adopt a holistic view of AmI, considering not just the technology, but the who- le of the innovation supply-chain from science to end-user, and also the various features of the academic, industrial, abd administrative environment that facilitate or hinder realisation of the AmI vision.

21 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 21 Plans, conflicts, social disruption and …gudgetry United States …consider that it is important to analyze not only technological issues, but social, as well as ethical issues. …aims at promoting interdisciplinary approaches to research on UbiComp, which tie computer science with other sciences and disciplines. …consider that UbiComp introduces a new security paradigm, regarding how we can deal with novel and sophisticated security and privacy requirements, recognizing that technical approaches will be insufficient for the protection of privacy and security in UbiComp. …, from the national security perspective, are probably the most organized nation in the world, in terms of strategies adopted and actions taken. …aim at keeping their leadership in the ICT sector, while preserving the national security, through concepts such as cybersecurity and critical infrastructure protection. …initiatives often address issues, such as patient safety and health, quality, prediction of health effects of pollutants, and participation to the digital society, but with no high priority.

22 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 22 Plans, conflicts, social disruption and …gudgetry Japan …aims at being different with UbiNet, while it envisions a new Oscar award for digital content/animation production, a local Hollywood city, as well as it expects to lean from the advanced and comprehensive security-related approaches taken in the US. …adopted UbiNet not only as its emerging ICT paradigm, but also as a main means for making the country the leading ICT nation in the world. …aims at being the most safe and secure nation in the world in the next decade or so, and to take fine care of - inter alia - the elderly, the disabled and the working women. …does not focus on pressing victims to take appropriate preventive measures but on punish- ing perpetrators of attacks. Thus the focus should be on the prosecution of offenders. …follows the tradition of the three sacred treasures of the digital home appliances, envisioning ubiquitous home appliances, ubiquitous offices, and ubiquitous cars. … currently utillizes Chinese resources, as bases for outsourcing and system development, responds to consolidations and company break-ups, and ensures business continuity in an emergency.

23 D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption 23 Contact us: Prof. Dr. Dimitris Gritzalis (dgrit@aueb.gr) Information Security and Critical Infrastructure Protection Research Group Department of Informatics Athens University of Economics and Business (Greece) website: www.cis.aueb.gr


Download ppt "Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou,"

Similar presentations


Ads by Google